|Publication number||US4629873 A|
|Application number||US 06/578,602|
|Publication date||Dec 16, 1986|
|Filing date||Feb 10, 1984|
|Priority date||Jun 15, 1979|
|Also published as||CA1159566A, CA1159566A1, DE2924325A1, DE2924325B2|
|Publication number||06578602, 578602, US 4629873 A, US 4629873A, US-A-4629873, US4629873 A, US4629873A|
|Inventors||Hermann Stockburger, Hans-Georg Winderlich|
|Original Assignee||Stockburger H, Winderlich Hans Georg|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (9), Referenced by (14), Classifications (13), Legal Events (3)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application is a continuation of application Ser. No. 369,212, filed Apr. 16, 1982 and Ser. No. 158,446, filed June 11, 1980, both abandoned.
This invention relates to a method of producing and analysing or evaluating secret identifying code marks in data carriers of the kind adapted to be scanned by machines and comprising at least one information trace or panel, wherein at least one individually specific parameter of the data carrier is converted into a unique identifying code number which is recorded on the data carrier in encoded form, the same parameter being ascertained for evaluation and the code number which is produced therefrom being compared with the decoded identifying number.
With the increasingly more widespread use of identity cards, cheque cards, personal code-key cards and the like it is becoming increasingly more important to safeguard such cards against abuse, forgery and deception. It is known to provide identifying cards of the kind in question with an information carrier embedded therein which contains an alpha-numerical card number in digital form. This card number is also interleafed with parts of the principal information recorded in a principal information trace. In other words, the principal information trace contains a mixed information consisting of principal information data and the card number. The card number is concealed in the principal information and difficult to isolate and identify. For checking, or verifying the card, the card number is filtered out of the principal information trace and compared with the fixed card number recorded on the accessory or secondary information carrier. The card will be accepted as genuine only if the said fixed card number agrees with the concealed card number in the principal information trace. This makes it impossible to transfer any information recorded, for example in a magnetic trace of an identity card by duplication to the information trace of another card without such deception being detected, because the cards are relatively clearly distinguished by the fixed information carriers embedded therein which show relatively different card numbers.
According to another known identification method a specifically individual information is stored unchangeably on an identifying card. When this identifying, or code-card is initially set up the permanent information present on that card is tied or linked with a secret key information and recorded on the information trace of the card. For checking the identifying code card a testing information is formed from selected parts of the permanent information and of the secret key information and this is checked for agreement with the permanent information stored on the card.
These conventional methods simply involve a process of interleafing or interweaving the information which is fixedly applied to the data carrier into the useful information. The interleafing pattern is however liable to be detected by a comparison of several cards with each other. For this reason conventional methods additionally resort to a complex technology in the production of the cards in order to prevent counterfeit right from the setting up of the data carrier.
It is the aim of the present invention to provide a method of the kind specified which affords a high degree of security in respect of fraud or counterfeit by virtue of the type and nature of the coding pattern so that the actual card material as such requires no complicated and expensive production process.
In pursuit of this aim the present invention provides that the identifying code number is processed in accordance with an unequivocally reversible arithmetic rule.
For example, according to this invention the identifying number may be encoded by being multiplied with a specific factor whilst being divided by the same factor for decoding. Addition or subtraction are also possible. Falsification-security may be further improved by processing individual parts of the identifying number, e.g. individual digits or figures according to relatively different arithmetic rules. For example individual figures or groups of figures in the identifying number may be multiplied by other factors than other figures or groups of figures. In addition to this the encoded number may also be interwoven or interleafed in the useful or purpose information.
The useful or purpose information to be recorded on the card may be encoded and recorded in the same way as the identifying number. In this manner the purpose information is encyphered and cannot be decyphered without knowing the processing rule or formula. In other words, the purpose information is secured not only against unauthorized transfer to another card but also against decyphering of the information concerned. This may be important, for example in the case of cheque cards where the information trace, besides carrying other data, also reflects the state of the owner's account. Should the account card fall into unauthorized hands it is perfectly safe in as much as the state of the account cannot be decyphered without knowledge of the specific arithmetic rule.
According to an attractive further development of this invention the individual parameter which is specific to each card may contain a processing rule or instruction. Whilst the system as a whole admits a wide range of arithmetic processing rules the individual parameter will specify in each case a specifically selected processing rule according to which the identifying number and, where desired also the purpose information, are encoded as well as decoded. This processing rule is itself provided in encoded form, e.g. "processing rule No. 6" on the data-carrier material so that a forger cannot learn anything about the special application of the processing rule. In other words, the data carrier contains in fixed form the identifying number as well as the arithmetic processing rule according to which the said number must be encoded for being recorded in the vehicle information trace. The encoded identiying number is recorded for the first time in the variable information trace when the identifying card is initially made out or "loaded". On this occasion a reading device ascertains or measures the individual parameter and splits it up into the calculating rule and the identifying number. The identifying number is then processed in accordance with the calculating rule and recorded as mixed information together with the purpose information in the variable information trace.
A device for producing identifying code marks in accordance with the method of this invention is characterised in that a reader device, for ascertaining the individual parameter of the data carrier in each case feeds the identifying number to an encoder device and a code information to a control device which contains a plurality of calculating rules or specifications, that the said control device feeds a calculating rule or specification which corresponds to the code information to the encoder device for processing the identifying number and that the encoder device controls a recording device which inscribes the information trace or panel.
Thus the calculating rule or specification according to which the identifying number is encoded is comprised in the individual parameter of the data carrier and may vary from data-carrier to data carrier. This makes unauthorised inscription of the data carriers very difficult as this is not possible without a specific identifying marking device containing a corresponding encoder device.
The blank data carrier may be further safeguarded by providing the identifying marker device with a scanning device for detecting the position or extension of an identifying mark on the data carrier and converting such position or extension (direction) of the identifying mark into a digital value which is fed, together with the identifying number picked up by the reader device, to a comparator and checked for agreement with the identifying number. In that case the position, extension or direction of the identifying mark must agree with the respective identifying number applied in digital form to the data carrier. Since the identifying mark is already applied to the blank data carriers the latter can be checked for forgeries even if the recording trace has not yet been inscribed. No special demands are made with regard to the card material and fabrication technology so that the blank cards can be fairly inexpensive. The identifying mark may be produced by printing methods.
An analyser or evaluator device for application in the method according to this invention is characterised in that a first reader device, for ascertaining the individual parameter of the data carrier, in each case feeds the respective identifying number to the input of a comparator and the encoding information to one control or gate input of a decoder, that a second reader device scanning the informtion trace or the information panel feeds the coded identifying number to the input of the decoder and that the output of the decoder is applied to the second input of the comparator. In this way the identifying number which is permanently, or fixedly provided on the data carrier is checked for agreement with the decoded identifying number in the information trace.
The analyser device may further comprise a scanning device for detecting position or direction and extension of an identifying mark on the data carrier, the position or extension and direction of such identifying mark being converted into a digital value which, together with the identifying number picked up by the first reader device is fed to a third input of the comparator and checked for agreement with the identifying number.
In this way the analyser device checks not only whether the identifying number in coded form is contained in the variable information trace but also whether the blank date carrier is genuine. In other words, an analyser device of this kind provides two criteria of authenticity.
A preferred embodiment of the invention is hereinafter more specifically described by way of example with reference to the accompanying drawings wherein:
FIG. 1 is a schematic representation of the recording of an inscription on a blank data carrier,
FIG. 2 diagrammatically shows an analyser or evaluator device,
FIG. 3 shows a punch tape incorporated in the data carrier, and
FIG. 4 illustrates the recording on the information trace of the data carrier.
In the present example the data carrier is a card 10 for example a cheque- or bank account card, which is used in conjunction with automatic goods- or service dispensing machines capable of reading the contents of a magnetic information trace 11. The card 10 comprises a punch tape 12 embedded therein which can be scanned by a reader machine. This punch tape 12 is not visible from the outside but concealed by covering layers which are permeable by certain rays in respect of which the tape 12 is impermeable.
The first perforation row 13 of the tape 12 is perforated in all punch points; this corresponds to a signal identifying the start of the tape. Next to perforation row 13 the tape 12 comprises a series of perforation rows KZ in which a numerical identifying number has been punched. In a further region RV of the tape the perforation rows are used to characterise a specific calculating rule and lastly the tape comprises a region PZ reserved for test numbers wherein it is determined, e.g. by punching whether the sum of the punched holes in the preceding perforation rows is even or odd, whether a sum of digits is applicable or the like.
For first time inscription of the magnetic trace 11, i.e. when the card 10 is initially made out or "loaded", the card 10 is inserted into a device which comprises a reader device 14 for reading the punch tape 12. This reader device ascertains the identifying number KZ and the calculating rule RV and relatively separates these two informations. The identifying number KZ is fed to an encoder device 15 and the calculating rule RV is fed to a control device 16 for the encoder device 15. This control device 16 contains numerous, consecutively numbered calculating rules or specifications. The signal RV provides the number of a specific calculating rule. The calculating rules stored in the control device 16 may read, for example, as follows: "multiply by 5", "add 65", or "multiply by 7 and add 24". The control device 16 ensures that the identifying number KZ will be processed in accordance with the calculating rule specified by RV. It feeds an encoded number KKZ to a magnetic recorder device 17 which records, or inscribes the encoded identifying number KKZ in the magnetic information trace 11.
For safeguarding the card 10 against forgery an identifying mark 18 is imprinted on the card. In the present example this mark 18 consists on a rectangular panel the length of which has a specific relation to the identifying number KZ. As the card 10 passes through the device the length of the identifying mark 18 is scanned by a further reader device 19 and converted into a numerical value. This numerical value is fed to a comparator 20 which also receives the identifying number KZ. Only if the numerical value of identifying mark 18 agrees with the identifying number KZ will the comparator actuate a switch 21 which is included in the signal line to the magnetic recording device 17 so that data will be recorded in the magnetic trace 11 and the card 10 be "loaded" only if there is agreement between the length of the identifying mark and the identifying number KZ. Besides the encoded identifying number KKZ, the information trace 11 is also inscribed with other purpose information, e.g. the client's account number, the branch number of the bank, the credit balance of the client, period of validity and date of issue of the card 10. In the course of subsequent use of the card the credit balance may be progressively reduced by the value of certain purchases and re-inscribed, to bring the card up to date. Such further data recorded on the magnetic trace 11 besides the encoded identifying number KKZ are also encoded in accordance with the applicable calculation rule RV so that they can be decyphered only with the aid of data KZ and RV recorded in punch tape 12 which together represent a specific individual parameter and that even this can only be done with the aid of a control device wherein the various calculating rules are respectively associated with the signals RV in precisely the same way as in control device 16.
FIG. 2 shows an analyser device of the kind fitted in automatic vending or service machines adapted to be operated by an identifying personal card 10 as hereinbefore described. The drawing is confined to those components which are required for a verification of authenticity of the card. The components for processing the decyphered purpose information are not shown.
The analyser device comprises a first reader device 25 arranged in the same way as reader device 14 to read the data recorded on tape 12. This reader device 25 differentiates between the identifying number KZ which is fed to a comparator 26 and the calculating rule RV which is applied to the control input of a decoder 27. The input of decoder 27 is connected with a second reader device 28 which reads the data of the information trace 11. The decoder 27 decodes the encoded identifying number KKZ in accordance with calculating rule RV and then feeds it to the comparator 26. The latter checks the output signal of decoder 27 for agreement with the identifying number KZ.
A scanner device 29 scans the length of the identifying mark 18 and converts this into a numerical value. The scanner device 29 is arranged in the same way as scanner device 19 in FIG. 1. The output signal of scanner device 29 is also applied to the comparator 26 and the latter will verify authenticity of card 10 only on condition that all three of its input signals are in agreement. Subject to this condition the following further output signals supplied by decoder 27 in accordance with the calculating rule RV will be fed via line 30 to a register- or computer device which evaluates the purpose information inscribed in the information trace 11. If the three input signals of comparator 26 do not agree with each other no signals will be fed into line 30.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US3513298 *||Aug 5, 1964||May 19, 1970||John B Riddle||High security credit card system|
|US3665162 *||Dec 11, 1969||May 23, 1972||Omron Tateisi Electronics Co||Identification system|
|US3761683 *||Nov 8, 1971||Sep 25, 1973||S Rogers||Security system|
|US3862716 *||Jan 14, 1974||Jan 28, 1975||Burroughs Corp||Automatic cash dispenser and system and method therefor|
|US3906447 *||Jan 31, 1973||Sep 16, 1975||Paul A Crafton||Security system for lock and key protected secured areas|
|US3985998 *||Aug 17, 1973||Oct 12, 1976||Century International Corporation||Personal authority verification system|
|US4013894 *||May 27, 1975||Mar 22, 1977||Addressograph Multigraph Corporation||Secure property document and system|
|US4025759 *||Oct 16, 1975||May 24, 1977||The Grey Lab. Establishment||Checking apparatus for documents|
|US4048475 *||Oct 26, 1976||Sep 13, 1977||Omron Tateisi Electronics Company||Apparatus for checking the user of a card in card-actuated machines|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US4774513 *||Nov 10, 1986||Sep 27, 1988||Michel Bonnaval-Lamothe||Process for controlling the use of documents and documents and means for implementing this process|
|US4780835 *||Jun 23, 1986||Oct 25, 1988||Pitney Bowes Inc.||System for detecting tampering with a postage value accounting unit|
|US4829168 *||Apr 24, 1987||May 9, 1989||Canon Kabushiki Kaisha||Optical memory card|
|US4908499 *||Dec 18, 1987||Mar 13, 1990||Schlumberger Industries||Revalidatable service supplying system|
|US5859935 *||Apr 25, 1997||Jan 12, 1999||Xerox Corporation||Source verification using images|
|US6212638||Dec 2, 1997||Apr 3, 2001||George C. Lee||Method for generating unpredictable authentication identification symbols|
|US7752137||Nov 3, 2003||Jul 6, 2010||Meyers Printing Company||Authentication and tracking system|
|US7917443||May 27, 2010||Mar 29, 2011||Verify Brand Llc||Authentication and tracking system|
|US7996319||Nov 3, 2004||Aug 9, 2011||Verify Brand Llc||Authentication and tracking system|
|US8280817||Mar 16, 2011||Oct 2, 2012||Verify Brand Llc||Authentication and tracking system|
|US8615470||Mar 21, 2007||Dec 24, 2013||Verify Brand||Authentication and tracking system|
|US20050097054 *||Nov 3, 2003||May 5, 2005||David Dillon||Authentication and tracking system|
|US20070185788 *||Mar 21, 2007||Aug 9, 2007||Meyers Printing Company||Authentication and Tracking System|
|US20110227694 *||Nov 18, 2009||Sep 22, 2011||Koninklijke Philips Electronics N.V.||Catheter interfacing|
|U.S. Classification||235/380, 235/489, 283/904|
|International Classification||G09C1/00, G07F7/12, G06K19/10|
|Cooperative Classification||Y10S283/904, G06K19/10, G07F7/125, G07F7/08|
|European Classification||G07F7/12B, G06K19/10, G07F7/08|
|Jul 17, 1990||REMI||Maintenance fee reminder mailed|
|Dec 16, 1990||LAPS||Lapse for failure to pay maintenance fees|
|Feb 26, 1991||FP||Expired due to failure to pay maintenance fee|
Effective date: 19901216